Synopsis: Important: kernel security and bug fix update
Advisory ID: SLSA-2022:5232-1
Issue Date: 2022-06-28
CVE Numbers: CVE-2022-1729
CVE-2022-1966
--
Security Fix(es):
* kernel: race condition in perf_event_open leads to privilege escalation
(CVE-2022-1729)
* kernel: a use-after-free write in the netfilter subsystem can lead to
privilege escalation to root (CVE-2022-1966)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
Bug Fix(es):
* XFS inode cluster corruption
* sock: sock_dequeue_err_skb() needs hard irq safety
* libceph: fix potential use-after-free on linger ping and resends
--
SL7
x86_64
bpftool-3.10.0-1160.71.1.el7.x86_64.rpm
bpftool-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-debug-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-debug-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-debuginfo-common-x86_64-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-tools-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpm
perf-3.10.0-1160.71.1.el7.x86_64.rpm
perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
python-perf-3.10.0-1160.71.1.el7.x86_64.rpm
python-perf-debuginfo-3.10.0-1160.71.1.el7.x86_64.rpm
kernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm
noarch
kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm
kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm
- Scientific Linux Development Team